Question No: 41 – (Topic 3)

Scenario:

You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has disabled your access to the show running-config command.

Which of the following statements is true about the serial links that terminate in R3

The R1-R3 link needs the neighbor command for the adjacency to stay up

The R2-R3 link OSPF timer values are 30, 120, 120

The R1-R3 link OSPF timer values should be 10,40,40

R3 is responsible for flooding LSUs to all the routers on the network.

Answer: B

Question No: 42 – (Topic 3)

Scenario:

You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has disabled your access to the show running-config command.

Areas of Router 5 and 6 are not normal areas, inspect their routing tables and determine which statement is true?

R5#39;s Loopback and R6#39;s Loopback are both present in R5#39;s Routing table

R5#39;s Loopback and R6#39;s Loopback are both present in R6#39;s Routing table

Only R5#39;s loopback is present in R5#39;s Routing table

Only R6#39;s loopback is present in R5#39;s Routing table

Only R5#39;s loopback is present in R6#39;s Routing table

Answer: A

Question No: 43 CORRECT TEXT – (Topic 3)

Route.com is a small IT corporation that is attempting to implement the network shown in the exhibit. Currently the implementation is partially completed. OSPF has been configured on routers Chicago and NewYork. The SO/O interface on Chicago and the SO/1 interface on NewYork are in Area 0. The loopbackO interface on NewYork is in Area 1. However, they cannot ping from the serial interface of the Seattle router to the loopback interface of the NewYork router. You have been asked to complete the implementation to allow this ping.

ROUTE.com#39;s corporate implementation guidelines require:

The OSPF process ID for all routers must be 10.

The routing protocol for each interface must be enabled under the routing process.

The routing protocol must be enabled for each interface using the most specific wildcard mask possible.

We need to add Chicago’s S0/1 interface to Area 21 Chicago(config-router)#network 192.168.16.4 0.0.0.3 area 21

Again, area 21 should not receive any external or inter-area routes (except the default route).

In order to accomplish this, we must stop LSA Type 5 if we don’t want to send external routes. And if we don’t want to send inter-area routes, we have to stop LSA Type 3 and Type 4. Therefore we want to configure area 21 as a totally stubby area.

The other interface on the Chicago router is already configured correctly in this scenario, as well as the New York router so there is nothing that needs to be done on that router.

Question No: 44 – (Topic 3)

Refer to the exhibit.

Which one statement is true?

Traffic from the 172.16.0.0/16 network will be blocked by the ACL.

The 10.0.0.0/8 network will not be advertised by Router B because the network statement for the 10.0.0.0/8 network is missing from Router B.

The 10.0.0.0/8 network will not be in the routing table on Router B.

Users on the 10.0.0.0/8 network can successfully ping users on the 192.168.5.0/24 network, but users on the 192.168.5.0/24 cannot successfully ping users on the 10.0.0.0/8 network.

Router B will not advertise the 10.0.0.0/8 network because it is blocked by the ACL.

Answer: E

Topic 4, VPN Technologies

Question No: 45 – (Topic 4)

A company has just opened two remote branch offices that need to be connected to the corporate network. Which interface configuration output can be applied to the corporate router to allow communication to the remote sites?

interface Tunnel0 bandwidth 1536

ip address 209.165.200.230 255.255.255.224

tunnel source Serial0/0 tunnel mode gre multipoint

interface fa0/0

bandwidth 1536

ip address 209.165.200.230 255.255.255.224

tunnel mode gre multipoint

interface Tunnel0 bandwidth 1536

ip address 209.165.200.231 255.255.255.224

tunnel source 209.165.201.1 tunnel-mode dynamic

interface fa 0/0 bandwidth 1536

ip address 209.165.200.231 255.255.255.224

tunnel source 192.168.161.2

tunnel destination 209.165.201.1 tunnel-mode dynamic

Answer: A

Question No: 46 – (Topic 4)

A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output? (Choose three.)

inbound crypto map

remaining key lifetime

path MTU

tagged packets

untagged packets

invalid identity packets

Answer: A,B,C

Question No: 47 – (Topic 4)

Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)

IP address

routing table

forwarding table

access control lists

NetFlow configuration

Answer: A,B,C

Question No: 48 – (Topic 4)

Which encapsulation supports an interface that is configured for an EVN trunk?

A. 802.1Q

ISL

PPP

Frame Relay

MPLS

HDLC

Answer: A

Question No: 49 – (Topic 4)

Question No: 50 – (Topic 4)

A user is having issues accessing file shares on a network. The network engineer advises the user to open a web browser, input a prescribed IP address, and follow the instructions. After doing this, the user is able to access company shares. Which type of remote access did the engineer enable?